Use GleanMark for a free trademark search powered by millions of USPTO records. See similar trademarks, filter results, and sign up for active monitoring.
Class 020: Pillows; Seat cushions; Foot rests; Bath pillows; Neck pillows; Bed rests; Chair pads; Back support cushions not for medical purposes; Sofas; Maternity pillows
Guns being weapons; noise-suppressors for guns; silencers for firearms; ammunition and projectiles; ammunition; muzzle compensators; projectiles for weapons; component parts for guns; "STEEL"
Paintings; Coasters made of paper; Face towels of paper; Flower-pot covers of paper; Heat transfer paper; Iron-on transfers of paper; Lithographic works of art; Pen and pencil covers comprised of leather, rubber, animal hide; Plastic or paper bags, envelopes, and pouches for merchandise packaging; Printed note books; Table napkins of paper; Tissues of paper for removing make-up; Wall decals; Wrapping paper; Writing instruments; Writing utensils
Class 003: Bath bombs; Bath salts, not for medical purposes; Bath and shower gels and salts not for medical purposes; Body butter; Body scrub; Body wash; Essential oils; Lip balm; Shower bombs; Scented body spray
Downloadable software and hardware systems for monitoring and controlling residential and commercial utilities via electronic sensors and automatic shut-off valves
Class 009: Rifle scopes; Laser rangefinders; Spotting scopes; Reflex sights for firearms; Tripods; Tripods; Telescopic riflescopes; Camera tripods; Camera mounts and supports; Binoculars; Class 013: Sighting mirrors for guns and rifles; Firearm attachments, namely, mounts for attaching telescopic sights to a firearm; Firearm attachments, namely, mounts for attaching accessories to a firearm; Tripods and stands for firearms; Sights, other than telescopic sights, for guns; Tripods for firearms; Firearm bipods; Firearm monopods; Sighting mirrors for rifles; Sighting mirrors for guns
downloadable computer software for computer network security; downloadable software for detecting, identifying, tracking, blocking, removing, analyzing, reporting and managing computer security threats and malware; downloadable software for creating and maintaining firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), network end point intrusion protection (EPP) to prevent unauthorized access to and use of computer networks and systems; downloadable software for providing security for email, internet and other electronic communications, for identifying and blocking potentially dangerous or undesirable electronic communications and content, for identifying and blocking electronic communications from illegitimate sources, and for identifying and blocking computer and electronic viruses, spam, spyware, malware, and other undesirable content; downloadable software for secure storage and management of identity and computer network access management data credentials; downloadable software for computer and network security policy, governance, risk and compliance administration and enforcement; Recorded computer software, namely, artificial intelligence (AI) decision analysis software for management of security data breach incidents and security operations center (SOC) remediation services, for use in the fields of computer and computer network security, forensic, diagnostic, business economic impact, and education pertaining to information, computer and incident security; downloadable computer software, namely, software for the protection of digital assets from cyber warfare, computer hacking, malware infection, and computer viruses; Computer security consulting; consulting in the field of information technology; consultation for protecting data and information from unauthorized access in the field of computer and network security, identifying malware on computer systems, identifying the source and creation origins of malware, and identifying the objectives of computer system attackers; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; maintenance and updating of computer software relating to computer and network security and prevention of computer risks; computer security consultancy for protecting data and information from unauthorized access, namely, developing plans for improving computer and network security to prevent against unauthorized access or data breach; cloud computing featuring software for use in computer and network security; cloud computing services in the field of computer and network security, namely, consulting services in the field of cloud computing; computer services, namely, online scanning, detecting, quarantining, and eliminating viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; computer systems analysis; monitoring of computer systems for protecting data and information from unauthorized access; computer security consultancy for protecting data and information from unauthorized access and computer technology consulting of systems for the surveillance and monitoring of vulnerability and security problems in computer hardware, networks, and software; computer security consultancy for protecting data and information from unauthorized access in the field of endpoint protection software or curated cyberthreat data for computer security assurance and identification of malicious intrusions into computers, computer networks or computer endpoints; software as a service (SAAS) services featuring software for computer and network security; software as a service (SAAS) services, namely, hosting software for use by others for detecting, blocking, and removing computer viruses and threats; platform as a service (PaaS) services featuring computer software platforms for detecting blocking, and removing computer viruses and threats; application service provider (ASP) featuring online non-downloadable computer software for use in computer and network security; computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security; computer security consultancy in the field of administration of digital keys and digital certificates
Software as a service (SAAS) services, namely, hosting software for use by others in tracking personnel location, personnel alert signaling indoor and outdoor environments; providing temporary use of nondownloadable computer software for receiving status and alerts over computer networks, intranets and the internet
Headphones; Sound reproducing apparatus; Earphones; Wireless communication devices for voice, data or image transmission; Audio speakers; Digital audio players; Microphones; Protective cases for audio equipment in the nature of headphones, earphones, earbuds; Earbuds
Class 009: Software; mobile apps; software for mobile phones; data protection backup units; privacy software; computer software; programs for computers; mobile software; software downloadable from the internet.
Musical instruments, namely, mutes for brass musical instruments; electric or electronic percussion or drum sets, drum trigger modules, generally, drum modules and percussion modules; electric and electronic string instruments, namely, violins, cellos, basses, violas, guitars, control units and signal processors sold as component parts therefor
LIGHTING FIXTURES MANUFACTURED AND DISTRIBUTED FOR PERMANENT OR TEMPORARY ARCHITECTURAL, THEATRICAL, ENTERTAINMENT, COMMERCIAL OR RESIDENTIAL APPLICATIONS
[ Mobile telephones; smart phones; tablet phones; tablet computers; portable computers; mobile phone, smart phone, tablet phone, tablet computers and portable computer accessories, namely, wired headsets, wireless headsets, car mobile device battery chargers; devices for hands-free use, protective plastic snap-on and flip covers, phone straps, screen protective films, bags and boxes for blocking cell signals, satellite, wireless local area networks and wireless telecommunications protocol frequencies in the nature of signal blocking bags and boxes, rechargeable batteries, battery chargers and stylus; ] computer software, namely, operating system software, utility software for the operation of the mobile device, applications software for the transmission and receipt of encrypted communications, enterprise and infrastructure software for the operation of mobile phones, smart phones, tablet phones, tablet computers, portable computers and handheld electronic devices; computer communication software for the receipt and transmission of data, messages and voice communications; downloadable software for voice and video telecommunications services connecting to the Public Switch Telephone (PSTN); (Based on Use in Commerce) National and international mobile telephone calling plan services; voice over internet protocol (VOIP) services; encrypted telephone communication services; encrypted conference call services, namely, teleconferencing and video conferencing services; communications services, namely, encrypted telephone communications services, transmission of instant messaging services, email and VOIP services; providing encrypted voice chat services; providing on-line chat rooms and electronic bulletin boards for transmission of encrypted messages among users in the field of general interest; encrypted text and numeric wireless digital messaging services; transmission of encrypted electronic mail and messaging services; providing on-line chat rooms for social networking; providing voice chat services; provision of encrypted voice and video telecommunication services by mobile device; rental of telecommunication equipment for voice and video telecommunications services connecting to the Public Switch Telephone (PSTN); providing virtual private network (VPN) services; Online retail store services featuring downloadable software applications for mobile phone devices and portable computers; Retail store services featuring equipment and software for voice and video telecommunications services connecting to the Public Switch Telephone (PSTN); Electronic data storage services; rental of software for voice and video telecommunications services connecting to the Public Switch Telephone (PSTN); providing the temporary use of on-line non-downloadable software for voice and video telecommunications services connecting to the Public Switch Telephone (PSTN)
Communications services, namely, encrypted email and VOIP; providing encrypted voice chat services; providing on-line chat rooms and electronic bulletin boards for transmission of encrypted messages among users in the field of general interest; and encrypted text and numeric wireless digital messaging services
Wellness and health-related consulting services; Health spa services for health and wellness of the body and spirit; Providing information about health, wellness and nutrition via a website; Providing information in the fields of health and wellness; Providing mental health and wellness information
[ SPORTING, ] SUPPORTING, GUIDING AND ACTUATING DEVICES FOR CURTAINS; ELECTRO-MECHANICAL TRANSPORT INSTALLATIONS FOR CURTAINS, ACCESSORIES FOR CURTAIN RAILS SUCH AS SUPPORTS, END COVERS, CORD GUIDES, GLIDERS AND ROLLERS, HOOKS AND TAPES, ALL SORTS OF CONNECTING PARTS, HANGERS, CORD DRAWN TRACK INSTALLATIONS FOR STAGES, SEPARATIONS FOR COMPARTMENTS, AND VERTICAL BLINDS
Class 041: Music production services; Audio recording services; Film and video film production; Entertainment services in the nature of development, creation, production and post-production services of multimedia entertainment content; Entertainment services in the nature of live visual and audio performances by actors, musical bands, dancers; Entertainment services, namely, providing non-downloadable prerecorded music via a website